Displaying 20 results from an estimated 10000 matches similar to: "Q. on key sniffing/spoofing"
2010 May 07
0
How to prevent IP-spoofing/traffic sniffing by the guest machines?
Hi,
In a libvirt/KVM setup, what is the best way to prevent untrusted guest
machines from (a) sending packets with a sender address different from their
own and (b) reading packets not intended for them?
Note that guests may have any number of IP addresses they are allowed to use
legitimately.
Guido
--
Too much multitasking isn't good for you.
2007 May 31
0
Custom CLI (spoofing) ?
I'm trying to have a go at CLI spoofing.
My outbound calls may go out over various VoIP providers, using least cost routing to determine which provider for call destination and time of day.
No matter which provider I go out over, i'd like the called party to only see only one of my numbers - that number will be the only number i'll want people to call back on.
To test, i've
2004 Aug 06
2
a new directory service
> Hopefully.. considering their DSP guy and a handful of others were laid
> off.. the new DSP they have really blows too so I'm forced into using the
> old one.. oh well.
The ogg plugin author was not an employee. He was a contractor. He's
still working on the plugin regardless.
> Oh that's cool.. and I assume the WMP plugin is available through the wacky
> MS
2007 Apr 18
0
[Bridge] ARP spoofing.
Hello all.
I know this does not directly relay to Ethernet bridging but I need some
advise... anyone want to give me some info/help on the subject.
In the interest of multipath routing I need to know if it is possible to
do a one-way arp spoof. Lets start with the machines layout...
br1------ADSL
br2------cisco router-----serial line.
br0-----Internal network.
I already have
1999 Mar 17
0
CIAC Bulletin J-035: Linux Blind TCP Spoofing
Enjoy.... ugh.
Dan
____________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L
Fermi National Accelerator Lab | email: yocum@fnal.gov /V\ I
P.O. Box 500 | WWW: www-oss.fnal.gov/~yocum/ // \\ N
Batavia, IL
2004 Aug 06
0
a new directory service
At 08:19 PM 10/17/2001 -0600, you wrote:
>I apologize for the delay in response time :)
>
>I got busy. Now I'm back :)
Cool, and you replied to me first! ;)
> > over and over for every station, wasting screen real estate and
> bandwidth both.
>
>Ah, in general I'm not dicussing here what's shown on screen. Only how
>the information is stored and used.
2015 Feb 16
1
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
Hi all
Assume that you have a linux bridge with two interfaces eth0 and eth1
enslaved to this bridge
What is the difference between sniffing the bridge and sniffing its
interfaces?
tcpdump -i br0 vs tcpdump -i eth0
Thanks
MiniME
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2015 Feb 16
2
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
I can think of several potential differences. ?You may miss any bridge
specific traffic (STP, LLDP) using the interfaces generated by the bridge
itself.
If you have vlan tagged sub interfaces you might also miss that traffic if
you were snooping a particular interface. Obviously you will miss any
on-wire broadcast traffic specific to the layer1 connection a particular
interface was connected to
2006 May 24
3
Spoofing a BLF Signal?
Is there anyway to "spoof" a BLF signal to a phone from within a
dialplan? That being so I can turn a BLF light on or off on a phone
when a certain thing happens in a dialplan?
1996 Sep 19
0
CERT Advisory CA-96.21 - TCP SYN Flooding and IP Spoofing Attacks
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-96.21
Original issue date: September 19, 1996
Last revised: --
Topic: TCP SYN Flooding and IP Spoofing Attacks
- -----------------------------------------------------------------------------
*** This advisory supersedes CA-95:01. ***
Two
2005 Jan 30
1
Caller ID spoofing
Hello everybody!
I am having the following problem and since I am a beginner in playing
with asterisk, i can't solve it:
I am trying to integrate my existing H.323 network in real world
telephony by ISDN cards. The problem is that i DON'T want to change all
e164 numbers in my h.323 network and my ISDN provider doesn't accept
those identities (CIDs). So, i have to spoof the outgoing
2007 Jun 28
2
Caller ID Spoofing to be banned in the USA
Anyone running caller id spoofing applications in the USA running
asterisk?
Then it's time to move them to Canada or similar.
http://arstechnica.com/news.ars/post/20070627-caller-id-spoofing-about-t
o-be-outlawed.html
Regards,
Dean Collins
Cognation Pty Ltd
dean at cognation.net
<mailto:dean at cognation.net> +1-212-203-4357 Ph
+61-2-9016-5642 (Sydney in-dial).
2003 Oct 12
0
idea (and patch): connection cookies
I have an idea for a protocol extension to limit the exposure of the
complex crypto code in ssh servers. It's like tcp-wrappers, but based
on a secret token rather than IP address.
Patch against openssh-3.7.1p2:
http://nick.cleaton.net/openssh-cc-0.03.patch
Details
=======
The "Connection Cookies" mechanism is an unofficial ssh protocol
extension designed to prevent attackers
2004 Jun 07
1
Network Sniffing Calls for recording
Ok assuming I don't want to record calls using * but instead want a
dedicated server that listens to a mirror port and records calls. Is there a
cheap software package out there for doing this for mgcp/sccp? I know if
evern cut over to * there is a way but I doubt I will even cut 100% over to
* so I was wonder what the list has heard of for call recording via sniffing
my gates. I know there
2008 Jan 31
2
Missing packets on Dom0 when sniffing bridge with wireshark/tethreal
Hi,
I have a Centos5 machine running xen 3.0.3-41 with two NICs each on its own
subnet: 192.168.1.x and 192.168.0.x. All DomUs can talk to each other OK
through two xen bridges. There are 3 DomUs: Dom0, Dom1 and Dom2
The scenario:
I''m trying to capture packets on Dom2 on 192.168.0.x from external devices
that are sending SIP stuff to Dom1, but fail to capture any packets. I
2007 Feb 26
1
About ISP sniffing, trying to undertstand
Hello,
I am trying to understand how Tor protect to ISP sniffing in proxy.
I suppose this steps:
1) Dowload Tor software, software should signed or downloaded from SSL
site.
2) Computer software verify that software is not modified, and install
it.
3) Vidalia starts tunnel, At this point how keys are exchanged?
...
--
--
Devel in Precio http://www.pas-world.com
2014 Dec 01
2
[Bug 10977] New: Rsync path spoofing attack vulnerability (rsync 3.1.1 tested)
https://bugzilla.samba.org/show_bug.cgi?id=10977
Bug ID: 10977
Summary: Rsync path spoofing attack vulnerability (rsync
3.1.1 tested)
Product: rsync
Version: 3.1.1
Hardware: All
OS: Linux
Status: NEW
Severity: critical
Priority: P5
Component: core
2011 Aug 25
1
security: SIP header spoofing CHANNEL(recvip)?
I am currently suffering various SIP attacks. I am using the following
extension to record the caller's IP address:
exten => h,n,set(CDR(srcip)=${CHANNEL(recvip)})
However, in recent attacks, this IP address is not correct, and I
believe that they are spoofing it. I am using asterisk 1.6.2.15.
Does the CHANNEL(recvip) variable record IP show in the SIP header
instead of the real, UDP
2013 Nov 19
2
macvtap direct and ip spoofing
Hi there. I have configured kvm domain (rhel6.4) with ethernet bridged over
macvtap, and found no filtration applied except mac. 'virsh' just silently
ignoring attributes 'filterref' and 'ip address' in different formats. No
error on validate stage. Config examples:
...
<interface type='direct'>
<mac address='52:54:00:31:ae:1a'/>
2005 Jun 05
0
ARP spoofing
Hi All,
I have a program that does ARP spoofing (not for hacking purposes!),
and I experienced occasional crashes in my switch (Cisco UBR7200).
Does anyone else had a similar problem? Maybe with other switches/routers?
Can this be the results of two machines trying to register the same
IP? Send invalid ARP packets?
Thanks,
Yuval.